Building business and operational resilience to cyber threats, compliance and third-party risk

19 - 21 July, 2022 (SGT) | Free Cyber Security Online Event

Day 2: 20th July 2022

9:00 - 9:45 SGT Leveraging on AI, data analytics and upcoming technologies to manage third-party risk for operational resilience

Mel Migriño - Vice President and Group CISO, Meralco

The essential part of any third-party risk management is having a holistic framework and a comprehensive due diligence process that covers all third-party in an organization. It is important to define the frameworks by segments and criticality by policies in place by the company as well as government compliance. To analyze all these data, you will need intelligent platforms to give you insights into the risk you are dealing with. With this in mind, Mel will share his insights on:  

  • Emerging third-party risk management trends in fintech and cyber  
  • Importance of AI in data analytics for better risk assessment  
  • Best practices to build business resilience in times of operational disruption  
  • Upcoming technologies to manage third-party in a complex and diverse ecosystem 
img

Mel Migriño

Vice President and Group CISO
Meralco

10:00 - 10:45 SGT Is Automation the Answer for Security Operations?

Mickey Perre - Cybersecurity Strategist APAC, Devo

We all know that automation is often touted as the saving grace in security operations. According to the 2021 Devo SOC Performance Report, 71% of security leaders surveyed expected automation to alleviate SOC analysts’ burnouts and pains. 

But is automation the actual answer to your security operations? 

Join Mickey, APAC Cyber Security Strategist at Devo, where he will uncover the truth behind automation and showcase a better solution to help you improve your security operations. 

  • Understand the difference between automation and autonomy in the SOC
  • Understand the necessary steps to become an autonomous SOC
  • Find out what benefits that will occur from shifting your strategy from automation to autonomy
  • Learn what the leading cause of SOC’s being challenged in their pursuit of security


img

Mickey Perre

Cybersecurity Strategist APAC
Devo

11:00 - 11:45 SGT Formulating an endpoint security strategy in the modern threat landscape

Romanus Prabhu - Director of Product Support & Security Evangelist, ManageEngine

Lack of visibility into endpoints has left enterprises stuck in IT blind spots which has been a deterrent to hybrid work adoption. These loopholes in security are exploited by cyberattackers which are a hurdle for enterprises. With attacks being extremely hard to measure and predict, we'll learn how you can lay a formidable strategy when it comes to ensuring optimum enterprise cyber hygiene. 

  • Staying prepared for IT and business landscape changes 
  • Securing endpoints in a hybrid work model 
  • Address and solve known and unknown vulnerabilities 
  • Taking a strategic approach to cyber hygiene 


img

Romanus Prabhu

Director of Product Support & Security Evangelist
ManageEngine

Cybercrime has evolved, making it harder for defenders to protect against, detect and stop attacks from entering their networks. As the pace of cyberattacks continues to increase — and the ways threat actors breach and infiltrate systems continue to become more targeted and evasive — our future will increasingly belong to the proactive.

  • The latest on ransomware’s meteoric rise
  • The locations and industries most targeted in 2021
  • Why we’ve reached an inflection point in the war on cybercrime
  • Never-before-seen malware, Encrypted threats, IoT malware, and more


img

Ken Law

Team Lead, Solution Engineering
SonicWall ASEAN

13:00 - 13:45 SGT Where is the risk in operating our business today?  How do we insure the critical applications and the networks that deliver them are properly protected and available?

Michael Geller - Distinguished Cyber Security Architect, Radware

In this session, Mike will identify where we have risk in keeping critical applications and the networks that deliver them available whether during peace time or when under attack.  To properly dimension the risk, Mike will provide an overview of application and network threats.  Then, he will investigate the attack lifecycle for both applications and networks that deliver them followed by an inspection of what security controls are relevant, and where we place them for maximum effectiveness, he will finish by covering what “protection” and “availability” look like in our networks today.

  • Learn to identify the risk in delivering critical applications and the networks that deliver them 
  • Learn about relevant threats 
  • Learn about the threat lifecycle and how to apply it 
  • Learn about the relevant security controls and where do we put them for maximum effectiveness 


img

Michael Geller

Distinguished Cyber Security Architect
Radware

14:00 - 14:45 SGT Devising an effective Third-Party Risk Management framework for better controls and compliance

Welcome Chan - Head of Technology Risk Management, ICBC (Asia)

With massive digital acceleration post pandemic in a hybrid work environment, managing vendors/supplier/partners (third-party) becomes more complex with more potential for data breaches, downtime, financial losses and other liabilities. Understanding the key framework as well as stages to third-party risk management is crucial in building cyber resilience. Welcome Chan will highlight a step-by-step approach to risk assessment with focus on: 

  • Best practices to manage third-party when accessing sensitive information or materials 
  • Understanding and defining third-party management process lifecycle 
  • Ways to manage risk and compliance issues arising from third-party business 
  • Selecting the right third-party risk metrics for multiple levels of management 
img

Welcome Chan

Head of Technology Risk Management
ICBC (Asia)